A Routing Attack pertains to an attack on the Internet Service Provider level that impacts either the uptime or one’s participation in a web-enabled system, like a blockchain.
What happens in a Routing Attack is impersonation. Basically, an intruder assumes the identity and privileges of another node so as to consume its resources or to throw the normal network operation off.
Such an attack may be carried out through the node’s misrepresentation of its identity. The entirety of the attack could be done by the modification of the attacker’s IP or Mac address to that of some other legitimate node. These attacks could be stopped through strong and stringent authentication procedures.